Passive assessments sniff the traffic present on the network to identify the working systems, network services, applications, and vulnerabilities.

a. true
b. false

Answer: a. true

Computer Science & Information Technology

You might also like to view...

A disgruntled employee executes a man-in-the-middle attack on the company network. Layer 2 traffic destined for the gateway is redirected to the employee's computer. This type of attack is an example of:

A. ARP cache poisoning B. IP spoofing C. amplified DNS attack D. evil twin

Computer Science & Information Technology

The ____________________ of a base class automatically makes the destructor of a derived class virtual.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology